Search results for: universal filtered multi-carrier technique
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7487

Search results for: universal filtered multi-carrier technique

6827 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 287
6826 Kinetic Monte Carlo Simulation of ZnSe Homoepitaxial Growth and Characterization

Authors: Hamid Khachab, Yamani Abdelkafi, Mouna Barhmi

Abstract:

The epitaxial growth has great important in the fabricate of the new semi-conductors devices and upgrading many factors, such as the quality of crystallization and efficiency with their deferent types and the most effective epitaxial technique is the molecular beam epitaxial. The MBE growth modeling allows to confirm the experiments results out by atomic beam and to analyze the microscopic phenomena. In of our work, we determined the growth processes specially the ZnSe epitaxial technique by Kinetic Monte Carlo method and we also give observations that are made in real time at the growth temperature using reflection high energy electron diffraction (RHEED) and photoemission current.

Keywords: molecular beam epitaxy, II-VI, morpholy, photoemission, RHEED, simulation, kinetic Monte Carlo, ZnSe

Procedia PDF Downloads 490
6825 Grain and Grain Boundary Behavior of Sm Substituted Barium Titanate Based Ceramics

Authors: Parveen Kumar, J. K. Juneja, Chandra Prakash, K. K. Raina

Abstract:

A series of polycrystalline ferroelectric ceramics with compositional formula Ba0.80-xSmxPb0.20Ti0.90Zr0.10O3 with x varying from 0 to 0.01 in the steps of 0.0025 has been prepared by solid state reaction method. The dielectric constant and tangent loss was measured as a function of frequency from 100Hz to 1MHz at different temperatures (200-500oC). The electrical behavior was then investigated using complex impedance spectroscopy (CIS) technique. From the CIS study, it has been found that there is a contribution of both grain and grain boundary in the electrical behavior of such ceramics. Grain and grain boundary resistivity and capacitance were calculated at different temperature using CIS technique. The present paper is about the discussion of grain and grain boundary contribution towards the electrical properties of Sm modified BaTiO3 based ceramics at high temperature.

Keywords: grain, grain boundary, impedance, dielectric

Procedia PDF Downloads 398
6824 Omni-Relay (OR) Scheme-Aided LTE-A Communication Systems

Authors: Hassan Mahasneh, Abu Sesay

Abstract:

We propose the use of relay terminals at the cell edge of an LTE-based cellar system. Each relay terminal is equipped with an omni-directional antenna. We refer to this scheme as the Omni-Relay (OR) scheme. The OR scheme coordinates the inter-cell interference (ICI) stemming from adjacent cells and increases the desired signal level at cell-edge regions. To validate the performance of the OR scheme, we derive the average signal-to-interference plus noise ratio (SINR) and the average capacity and compare it with the conventional universal frequency reuse factor (UFRF). The results show that the proposed OR scheme provides higher average SINR and average capacity compared to the UFRF due to the assistance of the distributed relay nodes.

Keywords: the UFRF scheme, the OR scheme, ICI, relay terminals, SINR, spectral efficiency

Procedia PDF Downloads 341
6823 Characteization and Optimization of S-Parameters of Microwave Circuits

Authors: N. Ourabia, M. Boubaker Ourabia

Abstract:

An approach for modeling and numerical simulation of passive planar structures using the edge line concept is developed. With this method, we develop an efficient modeling technique for microstrip discontinuities. The technique obtains closed form expressions for the equivalent circuits which are used to model these discontinuities. Then, it would be easy to handle and to characterize complicated structures like T and Y junctions, truncated junctions, arbitrarily shaped junctions, cascading junctions and more generally planar multiport junctions. Another advantage of this method is that the edge line concept for arbitrary shape junctions operates with real parameters circuits. The validity of the method was further confirmed by comparing our results for various discontinuities (bend, filters) with those from HFSS as well as from other published sources.

Keywords: optimization, CAD analysis, microwave circuits, S-parameters

Procedia PDF Downloads 454
6822 Drone On-Time Obstacle Avoidance for Static and Dynamic Obstacles

Authors: Herath M. P. C. Jayaweera, Samer Hanoun

Abstract:

Path planning for on-time obstacle avoidance is an essential and challenging task that enables drones to achieve safe operation in any application domain. The level of challenge increases significantly on the obstacle avoidance technique when the drone is following a ground mobile entity (GME). This is mainly due to the change in direction and magnitude of the GME′s velocity in dynamic and unstructured environments. Force field techniques are the most widely used obstacle avoidance methods due to their simplicity, ease of use, and potential to be adopted for three-dimensional dynamic environments. However, the existing force field obstacle avoidance techniques suffer many drawbacks, including their tendency to generate longer routes when the obstacles are sideways of the drone′s route, poor ability to find the shortest flyable path, propensity to fall into local minima, producing a non-smooth path, and high failure rate in the presence of symmetrical obstacles. To overcome these shortcomings, this paper proposes an on-time three-dimensional obstacle avoidance method for drones to effectively and efficiently avoid dynamic and static obstacles in unknown environments while pursuing a GME. This on-time obstacle avoidance technique generates velocity waypoints for its obstacle-free and efficient path based on the shape of the encountered obstacles. This method can be utilized on most types of drones that have basic distance measurement sensors and autopilot-supported flight controllers. The proposed obstacle avoidance technique is validated and evaluated against existing force field methods for different simulation scenarios in Gazebo and ROS-supported PX4-SITL. The simulation results show that the proposed obstacle avoidance technique outperforms the existing force field techniques and is better suited for real-world applications.

Keywords: drones, force field methods, obstacle avoidance, path planning

Procedia PDF Downloads 93
6821 Analysis of Arthroscopic Rotator Cuff Repair

Authors: Prakash Karrun, M. Manoj Deepak, Mathivanan, K. Venkatachalam

Abstract:

Our study aims to evaluate the rates of healing and the efficacy of the arthroscopic repair of the rotator cuff tears. 40 patients who had rotator cuff tears were taken up for the study and arthroscopic repair was done with double row technique.They were evaluated and followed up for a minimum of 2 years minimum.The functional status,range of motion and healing rates were compared post operatively. All the patients were followed up with serial questionnaires and MRI at the end of 2 years. There was significant improvement in the functional status of the patient. The MRI showed better rates of healing in these patients.Thus our study effectively proves the efficacy of our operating technique.

Keywords: rotator cuff tear, arthroscopic repair, double stich, healing

Procedia PDF Downloads 347
6820 Writing the Roaming Female Self: Identity and Romantic Selfhood in Mary Wollstonecraft’s Letters Written during a Short Stay in Sweden, Denmark, and Norway (1796)

Authors: Kalyani Gandhi

Abstract:

The eighteenth century in Britain saw a great burst of activity in writing (letters, journals, newspapers, essays); often these modes of writing had a public-spirited bent in-step with the prevailing intellectual atmosphere. Mary Wollstonecraft was one of the leading intellectuals of that period who utilized letter writing to convey her thoughts on the exciting political developments of the late eighteenth century. Fusing together her anxieties and concerns about humanity in general and herself in particular, Wollstonecraft’s views of the world around her are filtered through the lens of her subjectivity. Thus, Wollstonecraft’s letters covered a wide range of topics on both the personal and political level (for the two are often entwined in Wollstonecraft’s characteristic style of analysis) such as sentiment, gender, nature, peasantry, the class system, the legal system, political duties and rights of both rulers and subjects, death, immortality, religion, family and education. Therefore, this paper intends to examine the manner in which Wollstonecraft utilizes letter-writing to constitute and develop Romantic self-hood, understand the world around her and illustrate her ideas on the political and social happenings in Europe. The primary text analyzed will be Mary Wollstonecraft's Letters Written During a Short Stay in Sweden, Denmark and Norway (1796) and the analysis of this text will be supplemented by researching 18th-century British letter writing culture, with a special emphasis on the epistolary habits of women. Within this larger framework, this paper intends to examine the manner in which this hybrid of travel and epistolary writing aided Mary Wollstonecraft's expression on Romantic selfhood and how it was complicated by ideas of gender. This paper reveals Wollstonecraft's text to be wrought with anxiety about the world around her and within her; thus, the personal-public nature of the epistolary format particularly suits her characteristic point of view that looks within and without. That is to say, Wollstonecraft’s anxieties about gender and self, are as much about the women she sees in the world around her as much as they are about her young daughter and herself. Wollstonecraft constantly explores and examines this anxiety within the different but interconnected realms of politics, economics, history and society. In fact, it is her complex technique of entwining these aforementioned concerns with a closer look at interpersonal relationships among men and women (she often mentions specific anecdotes and instances) that make Wollstonecraft's Letters so engaging and insightful. Thus, Wollstonecraft’s Letters is an exemplar of British Romantic writing due to the manner in which it explores the bond between the individual and society. Mary Wollstonecraft's nuances this exploration by incorporating her concerns about women and the playing out of gender in society. Thus, Wollstonecraft’s Letters is an invaluable contribution to the field of British Romanticism, particularly as it offers crucial insight on female Romantic writing that can broaden and enrich the current academic understanding of the field.

Keywords: British romanticism, letters, feminism, travel writing

Procedia PDF Downloads 215
6819 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 501
6818 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 126
6817 Ultrasonic Evaluation of Periodic Rough Inaccessible Surfaces from Back Side

Authors: Chanh Nghia Nguyen, Yu Kurokawa, Hirotsugu Inoue

Abstract:

The surface roughness is an important parameter for evaluating the quality of material surfaces since it affects functions and performance of industrial components. Although stylus and optical techniques are commonly used for measuring the surface roughness, they are applicable only to accessible surfaces. In practice, surface roughness measurement from the back side is sometimes demanded, for example, in inspection of safety-critical parts such as inner surface of pipes. However, little attention has been paid to the measurement of back surface roughness so far. Since back surface is usually inaccessible by stylus or optical techniques, ultrasonic technique is one of the most effective among others. In this research, an ultrasonic pulse-echo technique is considered for evaluating the pitch and the height of back surface having periodic triangular profile as a very first step. The pitch of the surface profile is measured by applying the diffraction grating theory for oblique incidence; then the height is evaluated by numerical analysis based on the Kirchhoff theory for normal incidence. The validity of the proposed method was verified by both numerical simulation and experiment. It was confirmed that the pitch is accurately measured in most cases. The height was also evaluated with good accuracy when it is smaller than a half of the pitch because of the approximation in the Kirchhoff theory.

Keywords: back side, inaccessible surface, periodic roughness, pulse-echo technique, ultrasonic NDE

Procedia PDF Downloads 275
6816 Understanding the Social Movements around the ‘Rohingya Crisis’ within the Political Process Model

Authors: Aklima Jesmin, Ubaidur Rob, M. Ashrafur Rahman

Abstract:

Rohingya population of Arakan state in Myanmar are one the most persecuted ethnic minorities in this 21st century. According to the Universal Declaration of Human Rights (UDHR), all human beings are born free, equal in dignity and rights. However, these populations are systematically excluded from this universal proclamation of human rights as they are Rohingya, which signify ‘other’. Based on the accessible and available literatures about Rohingya issue, this study firstly found there are chronological pattern of human rights violations against the ethnic Rohingya which follows the pathology of the Holocaust in this 21st century of human civilization. These violations have been possible due to modern technology, bureaucracy which has been performed through authorization, routinization and dehumanization; not only in formal institutions but in the society as a whole. This kind of apparently never-ending situation poses any author with the problem of available many scientific articles. The most important sources are, therefore the international daily newspapers, social media and official webpage of the non-state actors for nitty-gritty day to day update. Although it challenges the validity and objectivity of the information, but to address the critical ongoing human rights violations against Rohingya population can become a base for further work on this issue. One of the aspects of this paper is to accommodate all the social movements since August 2017 to date. The findings of this paper is that even though it seemed only human rights violations occurred against Rohingya historically but, simultaneously the process of social movements had also started, can be traced more after the military campaign in 2017. Therefore, the Rohingya crisis can be conceptualized within one ‘campaign’ movement for justice, not as episodic events, especially within the Political Process Model than any other social movement theories. This model identifies that the role of international political movements as well as the role of non-state actors are more powerful than any other episodes of violence conducted against Rohinyga in reframing issue, blaming and shaming to Myanmar government and creating the strategic opportunities for social changes. The lack of empowerment of the affected Rohingya population has been found as the loop to utilize this strategic opportunity. Their lack of empowerment can also affect their capacity to reframe their rights and to manage the campaign for their justice. Therefore, this should be placed at the heart of the international policy agenda within the broader socio-political movement for the justice of Rohingya population. Without ensuring human rights of Rohingya population, achieving the promise of the united nation’s sustainable development goals - no one would be excluded – will be impossible.

Keywords: civilization, holocaust, human rights violation, military campaign, political process model, Rohingya population, sustainable development goal, social justice, social movement, strategic opportunity

Procedia PDF Downloads 283
6815 Kirchhoff’s Depth Migration over Heterogeneous Velocity Models with Ray Tracing Modeling Approach

Authors: Alok Kumar Routa, Priya Ranjan Mohanty

Abstract:

Complex seismic signatures are generated due to the complexity of the subsurface which is difficult to interpret. In the present study, an attempt has been made to model the complex subsurface using the Ray tracing modeling technique. Add to this, for the imaging of these geological features, Kirchhoff’s prestack depth migration is applied over the synthetic common shot gather dataset. It is found that the Kirchhoff’s migration technique in addition with the Ray tracing modeling concept has the flexibility towards the imaging of various complex geology which gives satisfactory results with proper delineation of the reflectors at their respective true depth position. The entire work has been carried out under the MATLAB environment.

Keywords: Kirchhoff's migration, Prestack depth migration, Ray tracing modelling, velocity model

Procedia PDF Downloads 365
6814 Design of Composite Joints from Carbon Fibre for Automotive Parts

Authors: G. Hemath Kumar, H. Mohit, K. Karthick

Abstract:

One of the most important issues in the composite technology is the repairing of parts of aircraft structures which is manufactured from composite materials. In such applications and also for joining various composite parts together, they are fastened together either using adhesives or mechanical fasteners. The tensile strength of these joints was carried out using Universal Testing Machine (UTM). A parametric study was also conducted to compare the performance of the hybrid joint with varying adherent thickness, adhesive thickness and overlap length. The composition of the material is combination of epoxy resin and carbon fibre under the method of reinforcement. To utilize the full potential of composite materials as structural elements, the strength and stress distribution of these joints must be understood. The study of tensile strength in the members involved under various design conditions and various joints were took place.

Keywords: carbon fiber, FRP composite, MMC, automotive

Procedia PDF Downloads 409
6813 A Fault Analysis Cracked-Rotor-to-Stator Rub and Unbalance by Vibration Analysis Technique

Authors: B. X. Tchomeni, A. A. Alugongo, L. M. Masu

Abstract:

An analytical 4-DOF nonlinear model of a de Laval rotor-stator system based on Energy Principles has been used theoretically and experimentally to investigate fault symptoms in a rotating system. The faults, namely rotor-stator-rub, crack and unbalance are modelled as excitations on the rotor shaft. Mayes steering function is used to simulate the breathing behaviour of the crack. The fault analysis technique is based on waveform signal, orbits and Fast Fourier Transform (FFT) derived from simulated and real measured signals. Simulated and experimental results manifest considerable mutual resemblance of elliptic-shaped orbits and FFT for a same range of test data.

Keywords: a breathing crack, fault, FFT, nonlinear, orbit, rotor-stator rub, vibration analysis

Procedia PDF Downloads 308
6812 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 333
6811 Metal Contents in Bird Feathers (Columba livia) from Mt Etna Volcano: Volcanic Plume Contribution and Biological Fractionation

Authors: Edda E. Falcone, Cinzia Federico, Sergio Bellomo, Lorenzo Brusca, Manfredi Longo, Walter D’Alessandro

Abstract:

Although trace metals are an essential element for living beings, they can become toxic at high concentrations. Their potential toxicity is related not only to the total content in the environment but mostly upon their bioavailability. Volcanoes are important natural metal emitters and they can deeply affect the quality of air, water and soils, as well as the human health. Trace metals tend to accumulate in the tissues of living organisms, depending on the metal contents in food, air and water and on the exposure time. Birds are considered as bioindicators of interest, because their feathers directly reflects the metals uptake from the blood. Birds are exposed to the atmospheric pollution through the contact with rainfall, dust, and aerosol, and they accumulate metals over the whole life cycle. We report on the first data combining the rainfall metal content in three different areas of Mt Etna, variably fumigated by the volcanic plume, and the metal contents in the feathers of pigeons, collected in the same areas. Rainfall samples were collected from three rain gauges placed at different elevation on the Eastern flank of the volcano, the most exposed to airborne plume, filtered, treated with HNO₃ Suprapur-grade and analyzed for Fe, Cr, Co, Ni, Se, Zn, Cu, Sr, Ba, Cd and As by ICP-MS technique, and major ions by ion chromatography. Feathers were collected from single individuals, in the same areas where the rain gauges were installed. Additionally, some samples were collected in an urban area, poorly interested by the volcanic plume. The samples were rinsed in MilliQ water and acetone, dried at 50°C until constant weight and digested in a mixture of 2:1 HNO₃ (65%) - H₂O₂ (30%) Suprapur-grade for 25-50 mg of sample, in a bath at near-to-boiling temperature. The solutions were diluted up to 20 ml prior to be analyzed by ICP-MS. The rainfall samples most contaminated by the plume were collected at close distance from the summit craters (less than 6 km), and show lower pH values and higher concentrations for all analyzed metals relative to those from the sites at lower elevation. Analyzed samples are enriched in both metals directly emitted by the volcanic plume and transported by acidic gases (SO₂, HCl, HF), and metals leached from the airborne volcanic ash. Feathers show different patterns in the different sites related to the exposure to natural or anthropogenic pollutants. They show abundance ratios similar to rainfall for lithophile elements (Ba, Sr), whereas are enriched in Zn and Se, known for their antioxidant properties, probably as adaptive response to oxidative stress induced by toxic metal exposure. The pigeons revealed a clear heterogeneity of metal uptake in the different parts of the volcano, as an effect of volcanic plume impact. Additionally, some physiological processes can modify the fate of some metals after uptake and this offer some insights for translational studies.

Keywords: bioindicators, environmental pollution, feathers, trace metals, volcanic plume

Procedia PDF Downloads 143
6810 Stress Field Induced By an Interfacial Edge Dislocation in a Multi-Layered Medium

Authors: Aditya Khanna, Andrei Kotousov

Abstract:

A novel method is presented for obtaining the stress field induced by an edge dislocation in a multilayered composite. To demonstrate the applications of the obtained solution, we consider the problem of an interfacial crack in a periodically layered bimaterial medium. The crack is modeled as a continuous distribution of edge dislocations and the Distributed Dislocation Technique (DDT) is utilized to obtain numerical results for the energy release rate (ERR). The numerical results correspond well with previously published results and the comparison serves as a validation of the obtained dislocation solution.

Keywords: distributed dislocation technique, edge dislocation, elastic field, interfacial crack, multi-layered composite

Procedia PDF Downloads 443
6809 Space Tourism Pricing Model Revolution from Time Independent Model to Time-Space Model

Authors: Kang Lin Peng

Abstract:

Space tourism emerged in 2001 and became famous in 2021, following the development of space technology. The space market is twisted because of the excess demand. Space tourism is currently rare and extremely expensive, with biased luxury product pricing, which is the seller’s market that consumers can not bargain with. Spaceship companies such as Virgin Galactic, Blue Origin, and Space X have been charged space tourism prices from 200 thousand to 55 million depending on various heights in space. There should be a reasonable price based on a fair basis. This study aims to derive a spacetime pricing model, which is different from the general pricing model on the earth’s surface. We apply general relativity theory to deduct the mathematical formula for the space tourism pricing model, which covers the traditional time-independent model. In the future, the price of space travel will be different from current flight travel when space travel is measured in lightyear units. The pricing of general commodities mainly considers the general equilibrium of supply and demand. The pricing model considers risks and returns with the dependent time variable as acceptable when commodities are on the earth’s surface, called flat spacetime. Current economic theories based on the independent time scale in the flat spacetime do not consider the curvature of spacetime. Current flight services flying the height of 6, 12, and 19 kilometers are charging with a pricing model that measures time coordinate independently. However, the emergence of space tourism is flying heights above 100 to 550 kilometers that have enlarged the spacetime curvature, which means tourists will escape from a zero curvature on the earth’s surface to the large curvature of space. Different spacetime spans should be considered in the pricing model of space travel to echo general relativity theory. Intuitively, this spacetime commodity needs to consider changing the spacetime curvature from the earth to space. We can assume the value of each spacetime curvature unit corresponding to the gradient change of each Ricci or energy-momentum tensor. Then we know how much to spend by integrating the spacetime from the earth to space. The concept is adding a price p component corresponding to the general relativity theory. The space travel pricing model degenerates into a time-independent model, which becomes a model of traditional commodity pricing. The contribution is that the deriving of the space tourism pricing model will be a breakthrough in philosophical and practical issues for space travel. The results of the space tourism pricing model extend the traditional time-independent flat spacetime mode. The pricing model embedded spacetime as the general relativity theory can better reflect the rationality and accuracy of space travel on the universal scale. The universal scale from independent-time scale to spacetime scale will bring a brand-new pricing concept for space traveling commodities. Fair and efficient spacetime economics will also bring to humans’ travel when we can travel in lightyear units in the future.

Keywords: space tourism, spacetime pricing model, general relativity theory, spacetime curvature

Procedia PDF Downloads 128
6808 Low-Complexity Multiplication Using Complement and Signed-Digit Recoding Methods

Authors: Te-Jen Chang, I-Hui Pan, Ping-Sheng Huang, Shan-Jen Cheng

Abstract:

In this paper, a fast multiplication computing method utilizing the complement representation method and canonical recoding technique is proposed. By performing complements and canonical recoding technique, the number of partial products can be reduced. Based on these techniques, we propose an algorithm that provides an efficient multiplication method. On average, our proposed algorithm is to reduce the number of k-bit additions from (0.25k+logk/k+2.5) to (k/6 +logk/k+2.5), where k is the bit-length of the multiplicand A and multiplier B. We can therefore efficiently speed up the overall performance of the multiplication. Moreover, if we use the new proposes to compute common-multiplicand multiplication, the computational complexity can be reduced from (0.5 k+2 logk/k+5) to (k/3+2 logk/k+5) k-bit additions.

Keywords: algorithm design, complexity analysis, canonical recoding, public key cryptography, common-multiplicand multiplication

Procedia PDF Downloads 435
6807 Analysis of Advanced Modulation Format Using Gain and Loss Spectrum for Long Range Radio over Fiber System

Authors: Shaina Nagpal, Amit Gupta

Abstract:

In this work, all optical Stimulated Brillouin Scattering (SBS) generated single sideband with suppressed carrier is presented to provide better efficiency. The generation of single sideband and enhanced carrier power signal using the SBS technique is further used to strengthen the low shifted sideband and to suppress the upshifted sideband. These generated single sideband signals are able to work at high frequency ranges. Also, generated single sideband is validated over 90 km transmission using single mode fiber with acceptable bit error rate. The results for an equivalent are then compared so that the acceptable technique is chosen and also the required quality for the optimum performance of the system is reported.

Keywords: stimulated Brillouin scattering, radio over fiber, upper side band, quality factor

Procedia PDF Downloads 236
6806 Construction of Green Aggregates from Waste Processing

Authors: Fahad K. Alqahtani

Abstract:

Nowadays construction industry is developing means to incorporate waste products in concrete to ensure sustainability. To meet the need of construction industry, a synthetic aggregate was developed using optimized technique called compression moulding press technique. The manufactured aggregate comprises mixture of plastic, waste which acts as binder, together with by-product waste which acts as fillers. The physical properties and microstructures of the inert materials and the manufactured aggregate were examined and compared with the conventional available aggregates. The outcomes suggest that the developed aggregate has potential to be used as substitution of conventional aggregate due to its less weight and water absorption. The microstructure analysis confirmed the efficiency of the manufacturing process where the final product has the same mixture of binder and filler.

Keywords: fly ash, plastic waste, quarry fine, red sand, synthetic aggregate

Procedia PDF Downloads 230
6805 Uranium Migration Process: A Multi-Technique Investigation Strategy for a Better Understanding of the Role of Colloids

Authors: Emmanuelle Maria, Pierre Crançon, Gaëtane Lespes

Abstract:

The knowledge of uranium migration processes within underground environments is a major issue in the environmental risk assessment associated with nuclear activities. This process is identified as strongly controlled by adsorption mechanisms, thus leading to strongly delayed migration paths. Colloidal ligands are likely to significantly increase the mobility of uranium in natural environments. The ability of colloids to mobilize and transport uranium depends on their origin, their nature, their structure, their stability and their reactivity with uranium. Thus, the colloidal mobilization and transport properties are often described as site-specific. In this work, the colloidal phases of two leachates obtained from two different horizons of the same podzolic soil were characterized with a speciation approach. For this purpose, a multi-technique strategy was used, based on Field-Flow Fractionation coupled to Ultraviolet, Multi-Angle Light Scattering and Inductively Coupled Plasma Mass Spectrometry (AF4-UV-MALS-ICPMS), Transmission Electron Microscopy (TEM), Electrospray Ionization Orbitrap Mass Spectrometry (ESI-Orbitrap), and Time-Resolved Laser Fluorescence Spectroscopy (TRLFS-EEM). Thus, elemental composition, size distribution, microscopic structure, colloidal stability and possible organic and/or inorganic content of colloids were determined, as well as their association with uranium. The leachates exhibit differences in their physical and chemical characteristics, mainly in the nature of organic matter constituents. The multi-technique investigation strategy used provides original data about colloidal phase structure and composition, offering a new vision of the way the uranium can be mobilized and transported in the considered soil. This information is a real significant contribution opening the way to our understanding and predicting of the colloidal transport.

Keywords: colloids, migration, multi-technique, speciation, transport, uranium

Procedia PDF Downloads 144
6804 Harnessing of Electricity from Distillery Effluent and Simultaneous Effluent Treatment by Microbial Fuel Cell

Authors: Hanish Mohammed, C. H. Muthukumar Muthuchamy

Abstract:

The advancement in the science and technology has made it possible to convert electrical energy into any desired form. It has given electrical energy a place of pride in the modern world. The survival of industrial undertakings and our social structure depends primarily upon low cost and uninterrupted supply of electrical energy. Microbial fuel cell (MFC) is a promising and emerging technique for sustainable bioelectricity generation and wastewater treatment. MFCs are devices which are capable of converting organic matter to electricity/hydrogen with help of microorganisms. Different kinds of wastewater could be used in this technique, distillery effluent is one of the most troublesome and complex and strong organic effluent with high chemical oxygen demand of 1,53,846 mg/L. A single cell MFC unit was designed and fabricated for the distillery effluent treatment and to generate electricity. Due to the high COD value of the distillery effluent helped in the production of energy for 74 days. The highest voltage got from the fuel cell is 206 mV on the 30th day. A maximum power density obtained from the MFC was 9.8 mW, treatment efficiency was evaluated in terms of COD removal and other parameters. COD removal efficiencies were around 68.5 % and other parameters such as Total Hardness (81.5%), turbidity (70 %), chloride (66%), phosphate (79.5%), Nitrate (77%) and sulphate (71%). MFC using distillery effluent is a promising new unexplored substrate for the power generation and sustainable treatment technique through harnessing of bioelectricity.

Keywords: microbial fuel cell (MFC), bioelectricity, distillery effluent, wastewater treatment

Procedia PDF Downloads 211
6803 Application of Support Vector Machines in Fault Detection and Diagnosis of Power Transmission Lines

Authors: I. A. Farhat, M. Bin Hasan

Abstract:

A developed approach for the protection of power transmission lines using Support Vector Machines (SVM) technique is presented. In this paper, the SVM technique is utilized for the classification and isolation of faults in power transmission lines. Accurate fault classification and location results are obtained for all possible types of short circuit faults. As in distance protection, the approach utilizes the voltage and current post-fault samples as inputs. The main advantage of the method introduced here is that the method could easily be extended to any power transmission line.

Keywords: fault detection, classification, diagnosis, power transmission line protection, support vector machines (SVM)

Procedia PDF Downloads 558
6802 Use of Large Eddy Simulations Model to Simulate the Flow of Heavy Oil-Water-Air through Pipe

Authors: Salim Al Jadidi, Shian Gao, Shivananda Moolya

Abstract:

Computational Fluid Dynamic (CFD) technique coupled with Sub-Grid-Scale (SGS) model is used to study the flow behavior of heavy oil-water-air flow in a horizontal pipe by adapting ANSYS Fluent CFD software. The technique suitable for the transport of water-lubricated heavy viscous oil in a horizontal pipe is the Core Annular flow (CAF) technique. The present study focuses on the numerical study of CAF adapting Large Eddy Simulations (LES). The basic objective of the present study is to gain a basic knowledge of the flow behavior of heavy oil using turbulent CAF through a conventional horizontal pipe. This work also focuses on the success and applicability of LES. The simulation of heavy oil-water-air three-phase flow and two-phase flow of heavy oil–water in a conventional horizontal pipe is performed using ANSYS Fluent 16.2 software. The influence of three-phase heavy oil-water air flow in a selected pipe is affected by gravity. It is also observed from the result that the air phase and the variation in the temperature impact the behavior of the annular stream and pressure drop. Some results obtained during the study are validated with the results gained from part of the literature experiments and simulations, and the results show reasonably good agreement between the studies.

Keywords: computational fluid dynamics, gravity, heavy viscous oil, three-phase flow

Procedia PDF Downloads 77
6801 Copula-Based Estimation of Direct and Indirect Effects in Path Analysis Models

Authors: Alam Ali, Ashok Kumar Pathak

Abstract:

Path analysis is a statistical technique used to evaluate the direct and indirect effects of variables in path models. One or more structural regression equations are used to estimate a series of parameters in path models to find the better fit of data. However, sometimes the assumptions of classical regression models, such as ordinary least squares (OLS), are violated by the nature of the data, resulting in insignificant direct and indirect effects of exogenous variables. This article aims to explore the effectiveness of a copula-based regression approach as an alternative to classical regression, specifically when variables are linked through an elliptical copula.

Keywords: path analysis, copula-based regression models, direct and indirect effects, k-fold cross validation technique

Procedia PDF Downloads 41
6800 Extracting Opinions from Big Data of Indonesian Customer Reviews Using Hadoop MapReduce

Authors: Veronica S. Moertini, Vinsensius Kevin, Gede Karya

Abstract:

Customer reviews have been collected by many kinds of e-commerce websites selling products, services, hotel rooms, tickets and so on. Each website collects its own customer reviews. The reviews can be crawled, collected from those websites and stored as big data. Text analysis techniques can be used to analyze that data to produce summarized information, such as customer opinions. Then, these opinions can be published by independent service provider websites and used to help customers in choosing the most suitable products or services. As the opinions are analyzed from big data of reviews originated from many websites, it is expected that the results are more trusted and accurate. Indonesian customers write reviews in Indonesian language, which comes with its own structures and uniqueness. We found that most of the reviews are expressed with “daily language”, which is informal, do not follow the correct grammar, have many abbreviations and slangs or non-formal words. Hadoop is an emerging platform aimed for storing and analyzing big data in distributed systems. A Hadoop cluster consists of master and slave nodes/computers operated in a network. Hadoop comes with distributed file system (HDFS) and MapReduce framework for supporting parallel computation. However, MapReduce has weakness (i.e. inefficient) for iterative computations, specifically, the cost of reading/writing data (I/O cost) is high. Given this fact, we conclude that MapReduce function is best adapted for “one-pass” computation. In this research, we develop an efficient technique for extracting or mining opinions from big data of Indonesian reviews, which is based on MapReduce with one-pass computation. In designing the algorithm, we avoid iterative computation and instead adopt a “look up table” technique. The stages of the proposed technique are: (1) Crawling the data reviews from websites; (2) cleaning and finding root words from the raw reviews; (3) computing the frequency of the meaningful opinion words; (4) analyzing customers sentiments towards defined objects. The experiments for evaluating the performance of the technique were conducted on a Hadoop cluster with 14 slave nodes. The results show that the proposed technique (stage 2 to 4) discovers useful opinions, is capable of processing big data efficiently and scalable.

Keywords: big data analysis, Hadoop MapReduce, analyzing text data, mining Indonesian reviews

Procedia PDF Downloads 201
6799 A Firefly Based Optimization Technique for Optimal Planning of Voltage Controlled Distributed Generators

Authors: M. M. Othman, Walid El-Khattam, Y. G. Hegazy, A. Y. Abdelaziz

Abstract:

This paper presents a method for finding the optimal location and capacity of dispatchable DGs connected to the distribution feeders for optimal planning for a specified power loss without violating the system practical constraints. The distributed generation units in the proposed algorithm is modeled as voltage controlled node with the flexibility to be converted to constant power node in case of reactive power limit violation. The proposed algorithm is implemented in MATLAB and tested on the IEEE 37-nodes feeder. The results that are validated by comparing it with results obtained from other competing methods show the effectiveness, accuracy and speed of the proposed method.

Keywords: distributed generators, firefly technique, optimization, power loss

Procedia PDF Downloads 533
6798 Fault Tolerant Control System Using a Multiple Time Scale SMC Technique and a Geometric Approach

Authors: Ghodbane Azeddine, Saad Maarouf, Boland Jean-Francois, Thibeault Claude

Abstract:

This paper proposes a new design of an active fault-tolerant flight control system against abrupt actuator faults. This overall system combines a multiple time scale sliding mode controller for fault compensation and a geometric approach for fault detection and diagnosis. The proposed control system is able to accommodate several kinds of partial and total actuator failures, by using available healthy redundancy actuators. The overall system first estimates the correct fault information using the geometric approach. Then, and based on that, a new reconfigurable control law is designed based on the multiple time scale sliding mode technique for on-line compensating the effect of such faults. This approach takes advantages of the fact that there are significant difference between the time scales of aircraft states that have a slow dynamics and those that have a fast dynamics. The closed-loop stability of the overall system is proved using Lyapunov technique. A case study of the non-linear model of the F16 fighter, subject to the rudder total loss of control confirms the effectiveness of the proposed approach.

Keywords: actuator faults, fault detection and diagnosis, fault tolerant flight control, sliding mode control, multiple time scale approximation, geometric approach for fault reconstruction, lyapunov stability

Procedia PDF Downloads 370